Sample Questions
Q) What Network Monitor uses to identify the network traffic going to a non-standard port?
a) The source domain
b) Total size of the package
c) UDP or TCP
d) Protocol signing
Q) While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for two reasons? (Select two.)
a) user security
a) Inability to handle the failover load
b) cluster updates
d) operational complexity
e) Network Connectivity
Q) What are the two operating systems supported by Veritas Cluster Server? (Select two.)
a) Fedora
b) Red Hat Enterprise Server
c) openSUSE
d) Mac OS
e) AIX
Q) That is a feature of the web-based setup?
a) It can be automated with an answer file.
b) It can be run using the Internet Explorer, Firefox or Safari.
c) You can install multiple operating systems simultaneously.
d) It runs the same installer command line commands.
Q) What is a feature of keyless licensing?
a) It works on all versions of Veritas Cluster Server
b) It requires a server accessible Veritas Operations Manager (VOM).
c) It requires that at least one key to be installed on each cluster host.
d) You have to install before installing Veritas Cluster Server